Part 1 WHAT SHOULD HAVE BEEN COVERED DAY ONE Ms. T. N. Jones1.

Slides:



Advertisements
Similar presentations
for 6th grade Technology
Advertisements

Technology and Ethics Joel Price. Lenses The first lens is as a technology user. The second lens is as an educator. The third lens is as a writer.
© Prentice Hall CHAPTER 15 Managing the IS Function.
Ten Commandments of Cyber Ethics. I. Thou shalt not use a computer to harm people Be polite when you are sending messages to people. Treat other people.
1 Presented by Ahmad Bahaitham Mohammad Felemban.
Internet Etiquette Shenita D. Ballard Misty Monreal Sandra Monroe
Cyber Crime. Statistics  The 2000 Computer Security Institute/FBI Computer Crime and Security Survey  Ninety percent of the study's 585 respondents.
COMPUTER ETHICS What does it mean to be “ethical” on the computer?
CDS Fall, 2011 Computing for Scientists Ethics (Dec. 06, 2011) Jie Zhang Copyright ©
 What are systems analysis and design?  Where do systems analysts work?  What modern business and technology trends are affecting information systems.
Understanding Business Ethics
CDS Fall, 2010 Computing for Scientists Ethics (Nov. 30, 2010) Jie Zhang Copyright ©
Spring 2010 Marco Valtorta CSCE 390 Professional Issues in Computer Science and Engineering Privacy Concerns (Chapters [B]) Spring.
Internet Etiquette or Netiquette BY: Jennifer Rudd Nov
What Is Computer Ethics?
Computers Are Your Future Twelfth Edition Spotlight 1: Ethics Copyright © 2012 Pearson Education, Inc. Publishing as Prentice Hall 1.
Port Byron Central School Port Byron NY Computer Ethics Presentation September 2003.
Computer Ethics – The Ten Commandments
Lead Black Slide. © 2001 Business & Information Systems 2/e2 Chapter 3 Information System Fundamentals.
THE WONDERFUL HISTORY OF COMPUTERS FROM THE BEGINNING HARDWARE, SOFTWARE,SAFTEY, AND COMPUTER ETHICS.
Computer ethics.
By Adam, Rachelgail & Kayla. What is internet Ethics? They are principles and guidelines to be applied whilst using the internet. Codes of ethics have.
Possible WebQuest type links  
Irwin/McGraw-Hill Copyright © 2000 The McGraw-Hill Companies. All Rights reserved Whitten Bentley DittmanSYSTEMS ANALYSIS AND DESIGN METHODS5th Edition.
Computer Ethics Prepared by. Discuss “Character is what you do when no one is watching.” --old adage.
Computer Ethics.
Computer technology—a double-edged sword Social issues Environmental issues Employment issues Legal and Security issues Ethical issues.
Computer Ethics for Computer Users
Computer Ethics Christina McCorkle.
© 2001 Business & Information Systems 2/e1 Chapter 3 Information System Fundamentals.
COMPUTER ETHICS Do you know the difference between right and wrong?
Beth Sanderson University of Washington Libraries, Bothell © Lawrence Snyder 2004 Computer / Information / Internet Ethics.
Chapter 7: IT Ethcs Courtney Littlejohn CSCI 101 Thursday 3:30.
Ethics, Privacy, & Safety. Source: Ethics in ComputingEthics in Computing.
Chapter 20 Information Management Technology Hellriegel, Jackson, and Slocum MANAGEMENT: A Competency-Based Approach South-Western College Publishing Copyright.
Business Ethics Why should business ethics concern you?
The Ten Commandments of Computer Ethics. The 1st Commandment Thou shalt not use a computer to harm Thou shalt not use a computer to harm other people.
Computer Crimes Career & Technology Education Department.
8/16/08Computer Ethics Institute Mae Thomas The Ten Commandments of Computer Ethics by the Computer Ethics Institute.
COMPUTER ETHICS. Computer Ethics n What is ethical behavior? n How do we make ethical decisions? n Matherial from Ethical Decision Making and Information.
CSC Intro. to Computing Lecture 19: Ethics & Computers.
Copyright © 2008 by The McGraw-Hill Companies, Inc. All rights reserved McGraw-Hill/Irwin Chapter 18 Management Information Systems.
The Ten Commandments of Computer Ethics Written by the Computer Ethics Institute A project of the Brookings Institution
Ethics Business Law Sunny Hills High School Mrs. Larsen.
ICS131 – Ethics 11/17/03. IEEE-CS and ACM 1.PUBLIC - Software engineers shall act consistently with the public.
Computer Ethics. Ten Commandments of Computer Ethics Copyright: Computer Ethics Institute Author: Dr. Ramon C. Barquin.
Issues in Implementing Technology in Schools Chapter 13 Teaching and Learning with Technology By Lever-Duffy and McDonald William Royalty.
Netiquette INFORMATION TECHNOLOGY AND ACQUIRING INFORMATION (JÄRVELÄ, RITVA-LIISA)
What is the safeguards when we want to reveal secret info? What things can people keep to them selves and not being cracked? Who is responsible for.
The History of Computers Hardware, Software, Programs, Computers Safety Tips, and Computer Ethics.
Welcome to Career and Technology Exploration (CTE) Ms. Lane Room 2031.
ALABAMA TECHNOLGY STANDARDS FOR TEACHERS Ethical Issues of Technology Presented by: Shirley Johnson & Keisha D. Smith.
Computer Ethics. Ethics The rules and standards governing the conduct of an individual with others.
 byte  short  int  long  float  double  boolean  char.
Intro to Information Security Phil Grimes Coach / Mentor Security Consultant.
 Computer Ethics  Definition  Information Ethics  Areas of Ethical Problems  Computer Ethics Issues  Computer Ethics: Academic Discipline  History.
Q1 A) What are the skills needed by systems analyst? The skills needed by systems analyst:  Working knowledge of information technology.  Computer programming.
Starter Who is this cheerful character?. Legal, Ethical and Environmental Implications of Computer Use.
Introduction to Information Security Module 1. Objectives Definitions of information technology and information security Fundamental Security Concepts.
Term II Software Engineering I (CS 508) System Analysis and Design (IS 503) Instructor Dr. Tarek Elghazaly.
What your students and Parents need to know  The ethical rules we live by also apply to technology.  Make students aware that how technology is.
Computer Ethics IT Fundamentals Battlefield High School.
Internet Etiquette or Netiquette
Computers Are Your Future Twelfth Edition
Chapter 16 – Careers in Information Technology
Internet Etiquette or Netiquette
Wilmington Area School District
The Legal System and Ethics in Information Security
Internet Etiquette or Netiquette
Unit 3- Introduction to Computer Ethics
Presentation transcript:

Part 1 WHAT SHOULD HAVE BEEN COVERED DAY ONE Ms. T. N. Jones1

2

Unit 1 Objective 1.1- Identify school policies, program policies, and safety procedures related to Information and Communication Technology. Ms. T. N. Jones3

COMPUTER/TECHNOLOGY ETHICS IS THE RIGHT AND WRONG USE OF TECHNOLOGY SIDE OF EVERYTHING Ms. T. N. Jones4

Ten Commandments for “Computer Ethics” 1- Thou shalt not use a computer to harm other people. 2-Thou shalt not interfere with other people’s computer work. 3-Thou shalt not snoop around in other people’s files. 4-Thou shalt not use a computer to steal. 5-Thou shalt not use a computer to bear false witness. 6-Thou shalt not use or copy software for which you have not paid. 7-Thou shalt not use other people’s computer resources without authorization. 8-Thou shalt not appropriate other people’s intellectual output. 9-Thou shalt think about the social consequences of the program you write. 10-Thou shalt use a computer in ways that show consideration and respect. Ms. T. N. Jones5

6

WHEN YOU ENTER THE CLASSROOM, SANITIZE YOUR HANDS Ms. T. N. Jones7

Do Not share your Log- in or Password information Ms. T. N. Jones8

Food, Drink, and Gum are not allowed in the Computer Lab Ms. T. N. Jones9

These are just a few of my Computer Lab Rules. Can you identify another Rule that would be beneficial to our Computer Lab. Ms. T. N. Jones10

You will LEARN to TYPE ASDF JKL; Ms. T. N. Jones11

INTERNET Ms. T. N. Jones12

We will Explorer Microsoft Office 2007 Microsoft Office 2007 consist of the following applications: Word 2007; Excel 2007; PowerPoint 2007; Publisher; Access; and Outlook 2007 Ms. T. N. Jones13

Microsoft Word 2007 Microsoft Excel 2007 Microsoft Word 2007 is the documentation software you would use to type a Report Excel 2007 is the Spreadsheet Program Ms. T. N. Jones14

Microsoft Access 2007 Microsoft PowerPoint 2007 Access is the Office 2007 Database Management System. PowerPoint is the Office application that can help you create a professional, Computerized Presentation Ms. T. N. Jones15

Ms. T. N. Jones16